Skip to Content
עקוב אחר הדגשת צילום מסך של SAP Data Intelligence

הפוך כאוס נתונים לערך נתונים עם אינטליגנציה של
נתונים

צרו תשתית איתנה לארכיטקטורת מארג הנתונים שלכם כדי לחבר, לגלות, לקבוע פרופיל, להכין ולנהל את כל נכסי הנתונים הארגוניים שלכם לתובנות עסקיות בנות ביצוע.

SAP Data Intelligence Cloud Technical Requirements

Our technical information and documentation can guide you through implementing, managing, and configuring SAP Data Intelligence Cloud.

placeholder
Getting started with SAP Data Intelligence Cloud

Learn about key functionality and how to navigate within SAP Data Intelligence Cloud.

placeholder
Modeling data pipelines

Find out how to create data processing pipelines and graphs within a runtime and design-time environment. 

placeholder
Using machine learning capabilities

Explore key machine learning functionality in SAP Data Intelligence Cloud and understand what it can help you achieve.

Implementation and Integration

Simplify implementation and integration of your solution by referring to detailed descriptions, requirements, and steps.

placeholder
Administration guide

Read the SAP Data Intelligence Cloud administration guide for information on creating connections, using the policy management tool, and more.

placeholder
Repository objects

Learn about the built-in operators, graphs, and controls offered by modeling functionality within SAP Data Intelligence Cloud.

placeholder
Data governance

Discover how to help ensure compliant and secure data processes with data governance features within SAP Data Intelligence Cloud.

Security and Trust for cloud applications

placeholder
SAP provides built-in security features and add-on solutions to help you protect your enterprise

By protecting you digital assets and enabling trusted data, SAP frees your team from time-consuming security tasks so they can focus on business innovation. 

  • Data security to help protect confidentiality and integrity of data
  • Business process security to support compliance with regulatory requirements
  • Risk and threat mitigation with constant improvement across operations

Back to top